[ create a new paste ] login | about

Recent Pastes:

Perl, pasted 52 seconds ago:
1
2
3
 @foo = ("aAa", "bbb");
@bar = grep(/aAa/i, @foo);
print join ",",@bar;
view (3 lines, 1 line of output)
C++, pasted 1 minute ago:
1
2
3
4
#include <iostream>
#include <cstdio>
#include <iostream>
#define TIME_QUANTUM 3
...
view (125 lines, 2 lines of output)
Perl, pasted 1 minute ago:
1
2
3
 @foo = ("aAa", "bbb");
@bar = grep(/^aaa/i, @foo);
print join ",",@bar;
view (3 lines, 1 line of output)
Perl, pasted 1 minute ago:
1
print 3+5+9
view (1 line, 1 line of output)
Perl, pasted 1 minute ago:
1
print 3+5+9
view (1 line, 1 line of output)
C, pasted 1 minute ago:
1
2
3
my @foo = ["aAa", "bbb"];
my @bar = grep(/^aaa/i, @foo);
print join ",",@bar;
view (3 lines, 7 lines of output)
C, pasted 2 minutes ago:
1
2
3
my @foo = ("aAa", "bbb");
my @bar = grep(/^aaa/i, @foo);
print join ",",@bar;
view (3 lines, 7 lines of output)
C, pasted 2 minutes ago:
1
2
3
4
#include <stdio.h>
#include <stdlib.h>

void prinbit32(short bit[]);
...
view (54 lines, 5 lines of output)
C, pasted 2 minutes ago:
1
2
3
4
5
#include <stdio.h>

void main()
{
    int a[10][10] = {0,};
...
view (23 lines, 10 lines of output)
C, pasted 2 minutes ago:
1
2
3
4
5
#include<stdio.h>
int main()
{
    int i,j;
    printf("*|\t");
...
view (26 lines, 11 lines of output)
C++, pasted 2 minutes ago:
1
2
3
4
5
#include <string>
#include <sstream>
#include <vector>

string func(string& a, string&b){
...
view (93 lines, 5 lines of output)
PHP, pasted 2 minutes ago:
1
2
3
4
5
<?php
error_reporting(-1);
if (isset($_GET['send'])){
$a = (int) $_GET['a'];
    $b = (int) $_GET['b'];
...
view (54 lines, 10 lines of output)
C, pasted 2 minutes ago:
1
2
3
4
#include <stdio.h>
#include <stdlib.h>

void prinbit32(short bit[]);
...
view (54 lines, 5 lines of output)
Plain Text, pasted 2 minutes ago:
1
2
3
4
5
I Am Offering Legits Hack Service and Hacking Tools, CCV, CC,PayPal, WU, MG,Fullz Ethical Hacking like any other forensic science involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation/documentation of evidence, identification, extraction and the accuracy of results.
I head a team of veterans that have been able to provide our clients with computer Ethical Hacking exploits /investigations for a broad range of civil disputes & criminal cases. These include: Different Kinds of Dating Sites, Hack Facebook/Whatsapp/Email, Litigation,Fraud, Hack/track Phones and computers, Source for any evidence/proof, Cash projects/money deals(You offering or me), Intellectual Property, Website Hack & security, Unlock computer system, Spy bug(competitors,employees,children,lovers etc), Credit score upgrade, DUI/ Criminal records removal, Retrieve lost files/documents, content removal, Test score upgrade, Source for test questions,Get your acc Verified on Twitter/Instagram, Tutorials and e-books & more with Patrick aka Lord Digital. 

I major in...
Any Kinds of Countries Passport worldwide
...
view (209 lines)
C, pasted 2 minutes ago:
1
2
3
@foo = ("aAa", "bbb");
@bar = grep(/^aaa/i, @foo);
print join ",",@bar;
view (3 lines, 11 lines of output)
C, pasted 2 minutes ago:
1
2
3
4
5
#include <stdio.h>

void main()
{
    int a[10][10] = {0,};
...
view (23 lines, 10 lines of output)
C, pasted 3 minutes ago:
1
2
3
4
5
#include <stdio.h>

void main()
{
    int a[10][10] = {0,};
...
view (23 lines, 10 lines of output)
Ruby, pasted 3 minutes ago:
1
nil.present?
view (1 line, 1 line of output)
C, pasted 3 minutes ago:
1
2
3
4
5
#include <stdio.h>

void main()
{
    int a[10][10] = {0,};
...
view (23 lines, 10 lines of output)
C, pasted 3 minutes ago:
1
2
3
4
5
#include <stdio.h>

void main()
{
    int a[10][10] = {0,};
...
view (23 lines, 10 lines of output)